diff options
Diffstat (limited to 'recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch')
-rw-r--r-- | recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch b/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch new file mode 100644 index 0000000..6ea1efd --- /dev/null +++ b/recipes-security/refpolicy/refpolicy/0049-policy-modules-system-logging-add-the-syslogd_t-to-t.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From de58aa981e1c05ce06938704089c7c87c765add6 Mon Sep 17 00:00:00 2001 | ||
2 | From: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
3 | Date: Thu, 22 Aug 2013 13:37:23 +0800 | ||
4 | Subject: [PATCH] policy/modules/system/logging: add the syslogd_t to trusted | ||
5 | object | ||
6 | |||
7 | We add the syslogd_t to trusted object, because other process need | ||
8 | to have the right to connectto/sendto /dev/log. | ||
9 | |||
10 | Upstream-Status: Inappropriate [embedded specific] | ||
11 | |||
12 | Signed-off-by: Roy.Li <rongqing.li@windriver.com> | ||
13 | Signed-off-by: Xin Ouyang <Xin.Ouyang@windriver.com> | ||
14 | Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com> | ||
15 | Signed-off-by: Yi Zhao <yi.zhao@windriver.com> | ||
16 | --- | ||
17 | policy/modules/system/logging.te | 3 +++ | ||
18 | 1 file changed, 3 insertions(+) | ||
19 | |||
20 | diff --git a/policy/modules/system/logging.te b/policy/modules/system/logging.te | ||
21 | index 3cab14381..caf319f04 100644 | ||
22 | --- a/policy/modules/system/logging.te | ||
23 | +++ b/policy/modules/system/logging.te | ||
24 | @@ -491,6 +491,9 @@ fs_getattr_all_fs(syslogd_t) | ||
25 | fs_search_auto_mountpoints(syslogd_t) | ||
26 | |||
27 | mls_file_write_all_levels(syslogd_t) # Need to be able to write to /var/run/ and /var/log directories | ||
28 | +mls_socket_write_all_levels(syslogd_t) # Need to be able to sendto dgram | ||
29 | +mls_trusted_object(syslogd_t) # Other process need to have the right to connectto/sendto /dev/log | ||
30 | +mls_fd_use_all_levels(syslogd_t) | ||
31 | |||
32 | term_write_console(syslogd_t) | ||
33 | # Allow syslog to a terminal | ||
34 | -- | ||
35 | 2.25.1 | ||
36 | |||